Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm400 Corporate DriveFt. Lauderdale, FL 33334954-772-1331
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session Two9:15 am - 9:45 am
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Matthew Jones is currently a manager of security engineers at Tenable. Prior to joining Tenable, Matt worked for Axon, a body cam video solution provider, Veritas, an information management company, Symantec, an information technology security company, Lumeta, an asset discovery company, Redsiren, a managed security service provider, Fore Systems, a networking switch and router provider, and Intel, the technology chip company. In the past 20+ years Matt has predominantly held positions in System Engineering, but has also been in product management, manufacturing, and procurement. Matt has been active in the Information Security Markets since 1998 and has held his CISSP since 2002. Matt’s education includes an engineering degree from Alfred University and an MBA from the University of Pittsburgh.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Session Four10:45 am - 11:30 am
Cloudy with a chance of breach
Explore the darker side of the Cloud as you hear war stories of some compromises and how to prevent them from happening to you! Also, understand the current state of malicious activity on the internet and how vulnerable your systems are to compromise.
Jeffrey grew up here in south Florida and graduated from Florida State University in 1998 with a Bachelors in Management Information Systems. He has worked as a software developer, database administrator, network administrator, and a security engineer. He has held positions in top-tier retailers, e-commerce, government, and start-up originations. He has worked in security for the last 14 years and has been at Check Point for the past 6 years. He is interested in cloud and the internet of Things, and how we radically need to change the way we think about securing our data and our devices, because the future is of warfare is in your pocket… and also your neighbor’s light bulb.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Session Five12:00 pm - 12:45 pm
Improve security, productivity and user experience through the Okta Identity Cloud
So, there are somewhere between a million and a half and two million apps out there. Right now, the average corporate IT department lets users access maybe 35—because of all the security and admin stuff involved in setting them up.
So how do you make it easier for your company to adopt more great technology—without creating insane security risks. One example of this is using a single sign-on, where you can use one username and password to get into any app. Another example is something called multi-factor authentication, where your computer prompts you for a fingerprint or a special code, to prove it’s you who’s trying to log in.
Join this informative session and hear about different options now available to your company to secure one of your company’s most important asset, the network and give access to the applications that your users require to do their jobs. And you will see first-hand demonstrations of not only how these work, but also how easy it is to configure and manage. This is a don’t miss session.
Steve is a Fort Lauderdale-based Enterprise Sales Engineer for Okta with 20 years of experience in the security space. His previous roles include CISO, VP of Information Security, data center manager, network engineer, and Windows systems engineer. He is passionate about understanding his customer’s challenges, earning their trust, and helping them fortify their security postures.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Why Are We Still Being Breached?
Are 1st Generation and NexGen solutions working?
Rick Pither runs worldwide security sales and OEM partnerships for SparkCognition. SparkCognition is a global leader in Artificial Intelligence, Machine Learning and Natural language Processing. Recently named a Global100 AI company, SparkCognition develops AI-Powered asset-protection software for the safety, security, and reliability of IT and IIoT. Prior to SparkCognition, Rick held various executive sales management positions at Secureworks, VMware and McAfee and Network General. Rick has earned a Bachelor of Science in Business from Purdue University and the Krannert School of Management.
Session Seven1:45 pm - 2:15 pm
Security in the World of IoT: The Convergence of Network Access Control and IoT Security
Ponemon Institute research shows IoT devices are the most challenging technology to secure. With a Gartner estimate that 20 billion IoT devices will be connected by 2020, and projections that 25% of identifiable attacks will involve IoT devices, securing these devices is crucial. This is especially concerning since a recent Ponemon Institute study found 75% of organizations are not confident or have no confidence that they know all of the IoT applications in their network.
Hackers are constantly scanning networks for vulnerabilities, and IoT devices are an easy target. In this session, we’ll discuss how the convergence of networks access control and IoT security can close the security gap caused by these devices.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Segmentation Made Simple
Most networks are really good at making you feel overwhelmed, ill-equipped and exposed. Meanwhile, you’re being tasked with connecting virtually every ‘thing’, including machines and endpoints never intended to be networked. How can you securely connect such a wide array of distributed systems, devices, and equipment at scale?
The practical way forward is networking endpoints with provable identities using automated, policy-based orchestration for enterprise scale. Now, local and wide area micro-segmentation is not only possible, but simple.
As more machines require secure connectivity, networking seems to have become a black magic, since it’s impossible to give every device its own unique IP address. There’s an assortment of workarounds using multi-NAT environments, or Carrier Grade NAT, but it’s now virtually impossible to punch through and connect distributed systems. IP address limitations are prohibitive, making functions such as cloud peering between VPCs virtually impossible.
In this session, you’ll learn how to overcome previously impossible networking hurdles by giving your machines and endpoints a unique and provable identity. You can now easily and instantly provision, connect, disconnect, failover, or quarantine any connected resource using simple point-and-click orchestration for all your ‘things’ – on the ground, on the move, or in the cloud.
Keynote Session3:00 pm - 3:45 pm
Jason is a graduate of Murray State University. Prior to joining the FBI, he served six years with the Kentucky State Police as a Trooper and Detective.
He is currently the Miami Cyber Crime Supervisory Special Agent and manages all FBI criminal cyber operations within the Southern District of Florida. Prior to his current role, he served at FBI Headquarters in the Major Cyber Crimes Unit combating cyber criminal threats targeting U.S. entities. He has additionally, served as the Safe Streets Gang & Violent Crime Task Force Coordinator for the FBI’s Springfield Division and worked high level public corruption and health care fraud cases in the Detroit Division. All these experiences have yielded him an invaluable holistic perspective as it relates to today’s cyber landscape.
Registration has closed for this conference